CVE-2024-39702
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
In lj_str_hash.c in OpenResty 1.19.3.1 through 1.25.3.1, the string hashing function (used during string interning) allows HashDoS (Hash Denial of Service) attacks. An attacker could cause excessive resource usage during proxy operations via crafted requests, potentially leading to a denial of service with relatively few incoming requests. This vulnerability only exists in the OpenResty fork in the openresty/luajit2 GitHub repository. The LuaJIT/LuaJIT repository. is unaffected.
En lj_str_hash.c en OpenResty 1.19.3.1 a 1.25.3.1, la función hash de cadena (utilizada durante el internamiento de cadenas) permite ataques HashDoS (denegación de servicio de hash). Un atacante podría provocar un uso excesivo de recursos durante las operaciones de proxy a través de solicitudes manipuladas, lo que podría provocar una denegación de servicio con relativamente pocas solicitudes entrantes. Esta vulnerabilidad solo existe en la bifurcación OpenResty en el repositorio de GitHub openresty/luajit2. El repositorio LuaJIT/LuaJIT. no se ve afectado.
CVSS Scores
SSVC
- Decision:Track
Timeline
- 2024-06-27 CVE Reserved
- 2024-07-23 CVE Published
- 2024-07-24 EPSS Updated
- 2024-08-02 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
CAPEC
References (1)
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
- | - | - | - | - |